General
-
Target
oitam.zip
-
Size
8.9MB
-
Sample
231023-yk8gtsfh67
-
MD5
0d5f921051f81fce17b29c61b94ca3a7
-
SHA1
84cf8e3c3c93aa8464ae23b50bd1c44a5470a7b6
-
SHA256
3a308f175cf1311d8584265c7996d033810c763d458e7648db523dcbd08988de
-
SHA512
28ce31d27392696eb04eb205c872c2ecdb38696012a5b0a2a20bac9984ebfb535ef47f1c8e204f0b6909673882bb07e9db1b4c6050a6ddee7391b3cb1c47a628
-
SSDEEP
196608:eDh1kd/Y68NzyATGHwUPzf2n80S4rzgnEFQlPuGNX2R5s/W26vasgxt:e1kd/YZpYPPz281Y0EuVuGNGPs/6vgxt
Static task
static1
Behavioral task
behavioral1
Sample
oitam.msi
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
oitam.msi
Resource
win10v2004-20231020-en
Malware Config
Extracted
darkgate
user_871236672
http://voodmastrelinux.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
vBojMjKiOxwdob
-
internal_mutex
txtMut
-
minimum_disk
35
-
minimum_ram
6000
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Targets
-
-
Target
oitam.msi
-
Size
9.1MB
-
MD5
8ef6bc142843232614b092fac948562d
-
SHA1
0e532489d6c1f1abc59941e9cb41cb38dcf8ac6e
-
SHA256
de3f49e68c45db2f31d1cc1d10ff09f8cfce302b92a1f5361c8f34c3d78544e5
-
SHA512
47d0874993410954abd0957c06bdd8d9534218d766032fac6f35b9b2614615d46ae263a7eea5e3979ce57ee5790b78f39cb1278e44db19446ca1e62c29dfcb3a
-
SSDEEP
196608:5hbWzPMCeNrs0rczeuNr/QnMOsaB9QVuHSzdUupBqbHSDjs6cvUOzZx:PbWzPM5HCZNrgMVw6wyZUupkjSPcvXx
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-